Understanding Viruses

The first tenet of warfare is this: know thy enemy. So what exactly are computer viruses? Computer viruses are devious little computer programs that attach themselves to legitimate program hosts and then engage in rampant self-replication. It's easy to be fooled by their small size. Don't be. They're never small for long. Computer viruses propagate like rabbits -- and by the time you first recognize their presence, your data may be permanently damaged or erased.

On this point, however, an important clarification must be made. Like biological viruses, computer viruses are not inherently destructive. You're probably harboring a fugitive cold virus in your body right now, even if you're not actually sick. With both biological and computer viruses, you can be infected without being affected. Your computer can be a veritable hive of viruses without exhibiting any visible symptoms or actual damage. If not instructed to do otherwise, viruses will quietly, unobtrusively and perpetually replicate. They're only destructive if intentionally engineered to be so.

Malicious computer viruses contain a "payload" -- a programming element separate from the self-replication code that executes its objectives. For example, a payload might display a personalized message on your monitor. It might erase critical data or program files, reformat your hard drive, or infiltrate your messaging software and overload the local network with authorless e-mail. But not all computer viruses are created equal. Some are full of sound and fury, yet signify nothing. Others are silent but deadly. In general, though, computer viruses are of three main types:

Macro Viruses: These are the most prevalent type of virus today. Unlike conventional viruses which can attach to virtually any program, macro viruses prey on specific programs. A macro itself is an instruction code that automatically executes other program commands. Many popular and prominent software applications utilize macros extensively. Essentially, macro viruses are macros that embed within a program and self-replicate.

Macro viruses that run on Microsoft applications like Word and Excel are particularly common -- chiefly because certain programming strategies employed by these applications make them particularly susceptible. Macro viruses work like this: when an infected document is initially opened, the macro virus embeds itself in the associated application and then proceeds to attach itself to every subsequent document created. In this way, the macro virus is unwittingly disseminated whenever the user transfers a document.

Parasitic Viruses: These are the most infectious type of virus. Parasitic viruses attach themselves to executable programs like .com or .exe files. Once an infected file is launched, the virus is free to replicate itself, embed in primary memory, or release its payload. Further, it can corrupt not just specific programs, but virtually any program being processed in RAM.

Boot Sector Viruses: The boot sector is essential software that resides on hard, floppy or optical disk, and is responsible for loading your operating system into memory at the start of a computing session. Boot sector viruses penetrate this vital boot sector and alter its contents. As opposed to macro viruses, boot sector viruses are spread not by sharing documents, but diskettes. Whenever new diskettes are introduced to a previously infected computer, the boot sector virus is transferred to the healthy diskette, which then conveys the virus to other computers, and so on.

These are all considered true computer viruses. Another commonly observed form of computer pestilence (though not literally a virus) is the worm. Worms differ from viruses in that they do not require a host to wreak their havoc. Other viruses are referred to as Trojan Horses. Trojan Horses are viruses that masquerade as legitimate programs, documents or other software, only to reveal their true function later. Trojan Horse viruses are often spread through e-mail or online bulletin boards.

Certainly no one would knowingly expose their computer to a virus. Unknowingly, however, thousands daily place their machines in peril. Ignorance is no excuse, though -- an ounce of prevention is worth a pound of cure. The following are some common troubleshooting techniques for keeping your computer virus-free:

- Always rely on a reputable anti-virus software application like Norton or McAfee.
- Always scan new files, diskettes or software before loading them on your machine.
- Always back-up critical software or files to avoid permanent loss due to infection or deletion.
- Always be wary of strange operating tics or unusual graphics.
- Always ensure vigilance from the other members on your computer or network.
- Always write-protect your system and program disks.
- Always enable Macro Virus Protection in all Microsoft applications.
- Never share diskettes or software without assuring their integrity.
- Never download e-mail or Internet files/programs without scanning them first.
- Never act on an e-mail virus alert without confirmation from an IT professional or trustworthy resource.
- Never boot your system with a diskette other than the original.

Privacy Policy

What Information Do We Collect?
When you visit our website you may provide us with two types of information: personal information you knowingly choose to disclose that is collected on an individual basis and website use information collected on an aggregate basis as you and others browse our website.

Personal Information You Choose to Provide
We may request that you voluntarily supply us with personal information, including your email address, postal address, home or work telephone number and other personal information for such purposes as correspondence, placing an order, requesting an estimate, or participating in online surveys.
If you choose to correspond with us through email, we may retain the content of your email messages together with your email address and our responses. We provide the same protections for these electronic communications that we employ in the maintenance of information received by mail and telephone.

Website Use Information
Similar to other websites, our site may utilize a standard technology called "cookies" (see explanation below, "What Are Cookies?") and web server logs to collect information about how our website is used. Information gathered through cookies and server logs may include the date and time of visits, the pages viewed, time spent at our website, and the sites visited just before and just after ours. This information is collected on an aggregate basis. None of this information is associated with you as an individual.

How Do We Use the Information That You Provide to Us?
Broadly speaking, we use personal information for purposes of administering our business activities, providing service and support and making available other products and services to our customers and prospective customers. Occasionally, we may also use the information we collect to notify you about important changes to our website, new services and special offers we think you will find valuable. The lists used to send you product and service offers are developed and managed under our traditional standards designed to safeguard the security and privacy of all personal information provided by our users. You may at any time to notify us of your desire not to receive these offers.

What Are Cookies?
Cookies are a feature of web browser software that allows web servers to recognize the computer used to access a website. Cookies are small pieces of data that are stored by a user's web browser on the user's hard drive. Cookies can remember what information a user accesses on one web page to simplify subsequent interactions with that website by the same user or to use the information to streamline the user's transactions on related web pages. This makes it easier for a user to move from web page to web page and to complete commercial transactions over the Internet. Cookies should make your online experience easier and more personalized.

How Do We Use Information Collected From Cookies?
We use website browser software tools such as cookies and web server logs to gather information about our website users' browsing activities, in order to constantly improve our website and better serve our users. This information assists us to design and arrange our web pages in the most user-friendly manner and to continually improve our website to better meet the needs of our users and prospective users.
Cookies help us collect important business and technical statistics. The information in the cookies lets us trace the paths followed by users to our website as they move from one page to another. Web server logs allow us to count how many people visit our website and evaluate our website's visitor capacity. We do not use these technologies to capture your individual email address or any personally identifying information about you.

Notice of New Services and Changes
Occasionally, we may use the information we collect to notify you about important changes to our website, new services and special offers we think you will find valuable. As a user of our website, you will be given the opportunity to notify us of your desire not to receive these offers by clicking on a response box when you receive such an offer or by sending us an email request.

How Do We Secure Information Transmissions?
When you send confidential personal information to us on our website, a secure server software which we have licensed encrypts all information you input before it is sent to us. The information is scrambled en route and decoded once it reaches our website.
Other email that you may send to us may not be secure unless we advise you that security measures will be in place prior to your transmitting the information. For that reason, we ask that you do not send confidential information such as Social Security, credit card, or account numbers to us through an unsecured email.

How Do We Protect Your Information?
Information Security -- We utilize encryption/security software to safeguard the confidentiality of personal information we collect from unauthorized access or disclosure and accidental loss, alteration or destruction.
Evaluation of Information Protection Practices -- Periodically, our operations and business practices are reviewed for compliance with organization policies and procedures governing the security, confidentiality and quality of our information.
Employee Access, Training and Expectations -- Our organization values, ethical standards, policies and practices are committed to the protection of user information. In general, our business practices limit employee access to confidential information, and limit the use and disclosure of such information to authorized persons, processes and transactions.

How Can You Access and Correct Your Information?
You may request access to all your personally identifiable information that we collect online and maintain in our database by emailing us using the contact form provided to you within the site structure of our website.

Do We Disclose Information to Outside Parties?
We may provide aggregate information about our customers, sales, website traffic patterns and related website information to our affiliates or reputable third parties, but this information will not include personally identifying data, except as otherwise provided in this privacy policy.

What About Legally Compelled Disclosure of Information?
We may disclose information when legally compelled to do so, in other words, when we, in good faith, believe that the law requires it or for the protection of our legal rights.

Permission to Use of Materials
The right to download and store or output the materials in our website is granted for the user's personal use only, and materials may not be reproduced in any edited form. Any other reproduction, transmission, performance, display or editing of these materials by any means mechanical or electronic without our express written permission is strictly prohibited. Users wishing to obtain permission to reprint or reproduce any materials appearing on this site may contact us directly.

Terms & Conditions

Return/Refund Policy

Refunds are returned using the original method of payment. If payment was made by credit card, your refund will be credited to that same credit card. Please contact us to discuss any necessary return or refund.

Delivery Standards

Orders are shipped by UPS, FedEx, USPS, or private courier. We will alert you to the planned shipping method and timeframe. If a tracking number is provided by the shipping carrier, we will update your order with the tracking information.